We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
FACULTY OF ENVIROMENTAL STUDIES (CES) CDeLBASIC IT SKIILS-BIT41USFULL NAMESTUDENT
NUMBERSTUDENT NAMEFrans Paulus190050012Lecturer’s name:Subject name:BASIC IT SKILLSSubject
code:BIT41USAssignment number:2Due date:18/09/2023Date of submission:17/09/2023INTELLECTUAL PROPERTY STATEMENT By checking the box below, I certify that this assignment is my own work and is free from plagiarism. I understand that the assignment may be checked for plagiarism by electronic or other means and may be transferred and stored in a database for the purposes of data-matching to help detect plagiarism. The assignment has not previously been submitted for assessment in any other unit or to any other institution. I have read and understood IUM’s Academic Regulations regarding Plagiarism (IUM Prospectus, pp. 31-32).Date: 17/09/2023 TABLE Of ContentsQuestion 1…………………………………………………………………………………2Question 2 … … … … … … … … … … … … … … … … … … … … … … … … … … … … … . . … 3 - 4References……………………………………………………………………………….....5Question 1a) Information Security: Information security refers to the practice of protecting information from unauthorized access, disclosure, alteration, or destruction, ensuring its confidentiality, integrity, and availability. It encompasses measures and strategies to safeguard data from various threats, both physical and digital.b) Internet Security: Internet security involves safeguarding data and information transmitted over the internet from various cyber threats, including viruses, malware, hackers, and other malicious activities. It includes measures to protect online activities, such as browsing, email communication, and online transactions.c) Cyber Bullying: Cyberbullying is the use of digital communication tools, such as social media, emails, or text messages, to harass, threaten, or harm individuals or groups online. It can involve insults, rumors, or spreading offensive content and can have serious emotional and psychological consequences.d) Malware: Malware is short for "malicious software." It encompasses various types of software programs created to disrupt, damage, or gain unauthorized access to computer systems. Examples include viruses, worms, Trojans, spyware, and ransomware.e) Pop-Up: A pop-up is a small graphical or text-based window that suddenly appears on a computer screen when a user is browsing the internet or using software. Pop-ups can contain advertisements, notifications, or prompts for actions and can sometimes be intrusive or unwanted.Question 2Types of Malware:Viruses: Malicious programs that attach themselves to legitimate files and replicate when executed.Worms: Self-replicating malware that spreads across networks without user intervention.Trojans: Software that disguises itself as legitimate but carries malicious functions.Spyware: Programs that secretly collect user information without consent.Ransomware: Malware that encrypts files and demands a ransom for decryption.Ways to Protect Your Computer from Malware:Install Antivirus Software: Use reputable antivirus software that regularly updates its virus definitions and performs real-time scanning.Keep Software Updated: Regularly update your operating system and software to patch vulnerabilities.Exercise Caution Online: Avoid downloading files from untrusted sources and clicking on suspicious links or email attachments.Use a Firewall: Enable a firewall to filter incoming and outgoing network traffic, blocking potential threats.Backup Data: Regularly back up important files to an external source to prevent data loss in case of ransomware attacks.Implement Strong Passwords: Use strong, unique passwords for accounts and enable two-factor authentication when available.Educate Yourself: Stay informed about common malware threats and their tactics to recognize potential risks.Regular Scanning: Perform regular malware scans on your computer to detect and remove any infections.b) Using an example, differentiate between Data and Information? Example: Consider a list of numbers: 3, 6, 9, 12, 15.Data: The list of numbers itself (3, 6, 9, 12, 15) is data. It is a collection of raw facts or values without context.Information: If you were to calculate the average of these numbers and present it as "The average of the numbers is 9," that statement is information. Information adds context, meaning, and relevance to the data.c) An antivirus (anti-virus) is a software program designed to detect, prevent, and remove malicious software (malware) from a computer or device. It helps protect the system from viruses, worms, Trojans, spyware, and other threats.Examples of Antivirus Software:Norton Antivirus: Developed by Norton LifeLock (formerly Symantec), Norton Antivirus is a popular antivirus program known for its comprehensive threat detection and removal capabilities.McAfee Antivirus: McAfee, owned by Intel Security, offers antivirus and security solutions for both individuals and businesses. It provides protection against a wide range of malware threats.ReferencesDhaliwal, J. S., & Benbasat, I. (1996). The use and effects of knowledge based system explanations: theoretical foundations and a framework for empirical evaluation. Information Systems Research, 7(3), pp. 342- 362.Drew, S. (1999). Building knowledge management into strategy: making sense of a new perspective. Long Range Planning, 32(1), pp. 130-136.Nonaka, I., Umemoto, K., & Senoo, D. (1996). From information processing to knowledge creation: a paradigm shift in business management. Technology in Society, 18(2), pp. 203-218.Heijst, G., Spek, R., & Kruizinga, E. (1997). Corporate memories as a toolfor knowledge management. Expert Systems With Applications, 13(1), pp. 41-54.Hendriks, P. H. J., & Vriens, D. J. (1999). Knowledge-based systems and knowledge management: friends or foes? Information and Management, 35, pp. 113-125.